Scotland's Digital Future: Scottish public sector cloud computing guidance
Guidance and principles on cloud computing in the Scottish public sector.
Case studies
Service Model |
Advantages |
Disadvantages |
Exemplar |
|
---|---|---|---|---|
Platform as a Service |
The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment. Languages, libraries, services, and tools supported by the provider. |
|||
|
|
Improvement Service The Improvement Service ( IS) recently looked at the options for renewing a number of their aged services that were currently delivered through multiple suppliers with individual contracts which was complex to manage. The technology stack and hardware was hosted in co-location facility. IS developed a cost model and business case to understand the cost-benefit of various options for upgrading and simplifying their services in scope ranging from reuse and virtualisation of the existing assets through to renewal based on a managed service wrapped around an open source platform. The solution is now hosted in a private cloud for less than half the price that IS were currently paying. This also included 24/7 telephone support for citizens and public sector service providers. No staff costs were included in this saving as it was agreed upfront that no staff losses would be incurred as part of the "outsourcing" of the service. The existing staff and operating model within the IS has been adapted with key roles to support the new managed service contract. |
||
Software as a Service |
The capability provided to the consumer is to use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. |
|||
|
|
University of Dundee - Microsoft Office 365 The University of Dundee is a leading university in the United Kingdom, internationally recognized for its expertise across a range of disciplines, including science, medicine, engineering, and art. The university looked to replace its GroupWise Novell email system with a hosted solution to improve reliability and communications and lower IT costs. The university selected Microsoft Office 365 because it gave them an opportunity to go beyond just email (Lync, SharePoint) and broaden the communication capabilities that it offers to students and staff. The case for Office 365 was also about reducing the total cost of ownership of the university's messaging solution. The university expects to reduce costs by £500,000 over five years, based on reduced IT administration and maintenance, lower infrastructure costs, and reduced staffing levels required to support the email system and its users. For hardware, the ICS department no longer has to acquire new servers or support the 40 servers previously dedicated to the GroupWise email system. The university has also avoided costs that would have been required had it decided to increase storage for the GroupWise email system |
||
Infrastructure as a Service. |
The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g. host firewalls). |
|||
|
|
Contact
Email: Philip Whitley
There is a problem
Thanks for your feedback